I've moved the functionality to a separate alias ( /triggerSparky ) to avoid identical code in the on TEXT and on ACTION event listeners. Your final script could look like something along the lines of the following script. You would read the value of their last usage using: $readini(sparky.ini, n, usage, $nick) In order to write a script, you will need to learn the basics of the mIRC scripting language by reading through the mIRC Scripts sections step by step, trying out the examples, and experimenting. If the difference between the times is less than 10 seconds (for example), it can send the command and then ignore them for 120 seconds. mIRC scripts can also be used to perform tasks that are not IRC-related, such as managing files on your computer, sending emails, or backing up your web server. Once a user triggers your script again, you can read the value from this INI file and compare it to the current time. mIRC will count the number of bytes you send to a server, and will initiate a flood check if you. Flooding usually results in your being disconnected from IRC servers since they place a limit on how much information you can send at one time. This is generally the way to compare times of events. Flood protection attempts to prevent you from flooding a server with messages sent in response to requests from other users via CTCP or a script. $ctime will evaluate to the number of seconds elapsed since 1. To write the data to this file, use something along the lines of the following: writeini sparky.ini usage $nick $ctime It executes TROJBIRTTA.A files to hide/unhide files with specific file names (nicknames, main, users). Drones are hacked machines used to launch flood attacks. You can save this information by using the writeini command. This Trojan is a malicious mIRC script that uses a legitimate mIRC client (daemon.exe) to connect to an IRC server and makes the affected computer a drone. This can easily be done by saving all data in an INI file. * Bot sets mode: +bbbbb d5442 C4572 u7247 L5474 prefix so it only works if the bot is op on the channel.I would recommend keeping track of all users that have used the command, and when they have last used it. * Bot sets mode: +bbbbbb x7544 x8172 a8945 K8243 t3893 Z7262 Flood protection attempts to prevent you from flooding a server with messages sent in response to requests from other users via CTCP or a script. which normally means less likely chance to flood out matches anything with 4 numbers at the end of the nick This Video illustrates the flood ive made on irc channels it was only done through 100 proxies and some 5 seconds which even hanged my computer too and all B. pushes modes together ie: +bbbb nick1 nick2 nick3 nick4 instead of new lines Requires pushmode! You may want to add your own kick command, but ban is enough to stop the proxy from talking/changing nick/join/part Just a simple code to prevent proxies from ClonesX.